gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-exchange] branch master updated: audit response: minor clarificat


From: gnunet
Subject: [taler-exchange] branch master updated: audit response: minor clarifications
Date: Sun, 27 Dec 2020 19:45:36 +0100

This is an automated email from the git hooks/post-receive script.

dold pushed a commit to branch master
in repository exchange.

The following commit(s) were added to refs/heads/master by this push:
     new 7536ffce audit response: minor clarifications
7536ffce is described below

commit 7536ffce798aa6d9c81207eaaf91a3cb4db6ad2a
Author: Florian Dold <florian@dold.me>
AuthorDate: Sun Dec 27 19:45:32 2020 +0100

    audit response: minor clarifications
---
 doc/audit/response-202012.tex | 19 ++++++++++---------
 1 file changed, 10 insertions(+), 9 deletions(-)

diff --git a/doc/audit/response-202012.tex b/doc/audit/response-202012.tex
index 97d8a0ce..90bd5954 100644
--- a/doc/audit/response-202012.tex
+++ b/doc/audit/response-202012.tex
@@ -209,13 +209,14 @@ section ``Exchange crypto helper design'' at 
\url{https://docs.taler.net/} of
 Chapter 12.
 
 {\bf Update:} In doing so, we also added a new type of signing key, the
-``security module'' signing key. This is used by the newly separated processes
-to sign the public keys that they guard the private keys for. The security
-module signatures are verified by the new ``taler-exchange-offline`` tool to
-ensure that even if the exchange process is compromised, we do not sign keys
-into existence that did not originate from the security module(s).  The
-security module public keys can be given in the configuration, or are learned
-TOFU-style.
+``security module'' signing key. This is used by the newly separated ``security
+module`` processes to sign the public keys that they guard the private keys
+for. The security module signatures are verified by the new
+``taler-exchange-offline`` tool to ensure that even if the {\tt
+taler-exchange-httpd} process is compromised, the offline signature tool would
+refuse to sign new public keys that do not originate from the security
+module(s).  The security module public keys can be given in the configuration,
+or are learned TOFU-style.
 
 
 \subsection{File system access}
@@ -234,9 +235,9 @@ We have started to better document the operational 
requirements on running the
 auditor.
 
 {\bf Update:} On the exchange side, we have now moved additional information
-into the database, in particular information about offline signatures
+from the file system into the database, in particular information about 
offline signatures
 (including key revocations) and wire fees.  This simplifies the deployment and
-the interaction with the offline key.  The remaining disk accesses are for
+the interaction with offline key signing mechanism.  The remaining disk 
accesses are for
 quite fundamental configuration data (which ports to bind to, configuration to
 access the database, etc.), and of course the program logic itself.
 

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]